Browse Definitions :
Definition

graph analytics

Contributor(s): Laura Fitzgibbons

Graph analytics is a category of tools used to apply algorithms that will help the analyst understand the relationship between graph database entries.

The structure of a graph is made up of nodes (also known as vertices) and edges. Nodes denote points in the graph data. For example, accounts, customers, devices, groups of people, organizations, products or locations may all be represented as a node. Edges symbolize the relationships, or lines of communication, between nodes. Every edge can have a direction, either one-way or bidirectional, and a weight, to depict the strength of the relationship.

Once the graph database is constructed, analytics can be applied. The algorithms can be used to identify values or uncover insights within the data such as the average path length between nodes, nodes that might be outliers and nodes with dominant activity. It can also be used to arrange the data in new ways such as partitioning information into sections for individual analysis or searching for nodes that meet specific criteria.

Some common tools used to create graph analytics include Apache Spark GraphX, IBM Graph, Gradoop, Google Charts, Cytoscape and Gephi.

Types of graph analytics

There are four main types of analytics that can be applied to graphs:

  1. Path analysis- This focuses on the relationships between two nodes in a graph. This type of graph analytics can help identify the shortest path between nodes, find the widest path between weighted nodes and calculate a spanning tree around a center point.
  2. Connectivity analysis- This focuses on the weight of the edges between nodes. It can be applied to identify weaknesses in a system or anomalies such as abnormally high or low activity.
  3. Community analysis- This focuses on the interactions between nodes. It clusters nodes into labeled groups of similar objects to help with organization.
  4. Centrality analysis- This focuses on the relevancy of each node in a graph. It can be used to rank popularity or influence between nodes.

Examples of applications for graph analytics

Graph analytics can be used for a variety of applications, such as:

  • Detecting cybercrimes such as money laundering, identity fraud and cyberterrorism.
  • Applying analysis to social networks and communities such as monitoring statistics and identifying influencers.
  • Performing analysis on the traffic and quality of service for computer networks.
  • Optimizing logistics for manufacturing and transportation industries.
  • Determining page rank analytics and tracking their popularity or amount of clicks.
  • Analyzing the parts of a software application and how they interact to find potential issues.
This was last updated in July 2019

Continue Reading About graph analytics

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

Which type of graph analytics does your organization use most often?
Cancel
Hello,

We used quite a fair bit of community analysis. 

A very major part of the application is predicting missing attribute by creating different communities. 

Similarly the community analyses can also be used for organization development by analysing the organisational email communication.

You can check out some examples here: https://lynxkite.com/docs/latest/

Cheers,
Fai

Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close